<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">

  <url><loc>https://pranavunnikrishnan.com/</loc><changefreq>monthly</changefreq><priority>1.0</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog.html</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://pranavunnikrishnan.com/projects.html</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge.html</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://pranavunnikrishnan.com/search.html</loc><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/air-india-data-breach.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/comptia-ai-essentials-reflections.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/cve-2023-29552-ddos.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/cysa-plus-first-attempt.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/human-error-social-engineering.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/iot-security-risk.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/mfa-limitations.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/phishing-as-a-service.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/phishing-email-safety.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/blog/twitter-mfa-rollback.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/projects/we-manage.html</loc><priority>0.6</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-0.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-1.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-2.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-3.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-4.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-5.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-6.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-7.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-8.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-9.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-10.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-11.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-12.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-13.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-14.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-15.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-16.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-17.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-18.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-19.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-20.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-21.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/ctf/overthewire/bandit/level-22.html</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/favourite-resources/</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/grc-audit/</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/security-as-i-understand-it/</loc><priority>0.5</priority></url>
  <url><loc>https://pranavunnikrishnan.com/knowledge/security-as-i-understand-it/the-basics-as-i-understand-it.html</loc><priority>0.5</priority></url>

</urlset>
